Combinatorics of p-ary Bent Functions

Size: px
Start display at page:

Download "Combinatorics of p-ary Bent Functions"

Transcription

1 Combinatorics of p-ary Bent Functions MIDN 1/C Steven Walsh United States Naval Academy 25 April 2014

2 Objectives Introduction/Motivation Definitions Important Theorems Main Results: Connecting Bent Functions to Combinatorical Structures Conclusion

3 Introduction/Motivation Linear feedback shift register: a shift register in which inputs are linear functions of their previous states Can be used to generate pseudo-random sequences that can be used as keystreams in a stream cipher system Example: Fibonacci sequence (mod 2), defined by initial state s 0 = 0, s 1 = 1 and recursive function s n = s n 1 + s n 2 (0,1,1,2,3,5,8,13,21...) (0,1,1,0,1,1,0,1,1...) LFSRs can be broken using the Berlekamp-Massey algorithm

4 Berlekamp-Massey algorithm For a binary LFSR with key length n and maximal length period 2 n 1, only 2n consecutive terms of the sequence are required to determine the coefficients of the LFSR Example: Fibonacci sequence mod 2, key length is 2 and period is 3, so 4 digits are required to decode the LFSR Example: choose a 4-bit subsequence (say, (0,1,1,0)) and use the equation s n = c 1 s n 1 + c 2 s n 2 to solve for c 1 and c 2 and thus, determine the key (c 1, c 2 ): 1 = c 1 (1) + c 2 (0) c 1 = 1 0 = c 1 (1) + c 2 (1) = 1(1) + c 2 (1) c 2 = 1

5 Implementing more secure cipher stream systems LFSRs are very susceptible to decryption through various techniques, including Berlekamp-Massey algorithm and brute force attacks To construct more secure keystreams, utilize bent, or perfectly non-linear, functions non-linearity will generate more random sequences resistant to linear cryptanalysis

6 Definitions and Examples

7 Walsh-Hadamard transform For f : GF (p) n GF (p), the Walsh-Hadamard transform of f is a complex-valued function on GF (p) n defined by: W f (u) = x GF (p) n ζ f (x) u,x where ζ = e 2πi/p (the pth root of unity). f : GF (p) n GF (p) is bent if W f (u) = p n/2 for all u GF (p) n.

8 Partial difference sets Let G be a finite abelian group of order v Let D be a subset of G with cardinality k D is a (v, k, λ)-difference set if the multiset {d 1 d 1 2 d 1, d 2 D} contains every non-identity element of G exactly λ times D is a (v, k, λ, µ)-partial difference set (PDS) if the multiset {d 1 d2 1 d 1, d 2 D} contains every non-identity element of D exactly λ times and every non-identity element of G \ D exactly µ times

9 Cayley graphs Constructing a Cayley graph: Let G be a group, let D G such that 1 / D Let the vertices of the graph be elements of G Two vertices g 1 and g 2 are connected by a directed edge from g 1 to g 2 if g 2 = dg 1 for some d D For a (v, k, λ, µ)-pds D, the Cayley graph X (G, D) is a srg-(v, k, λ, µ) if: X (G, D) has v vertices such that each vertex is connected to k other vertices Distinct vertices g 1 and g 2 share edges with either λ or µ common vertices

10 Bent function correspondences Two known ways to determine whether a function is bent (for p = 2) Dillon correspondence: f : GP(2) n GF (2) is bent if and only if the level curve f 1 (1) = {v GF (2) n f (v) = 1} yields a difference set in GF (2) n with parameters (v, k, λ) = (4m 2, 2m 2 ± m, m 2 ± m) for some integer m Bernasconi correspondence: f : GF (2) n GF (2) is bent if and only if the Cayley graph of f is a srg-(2 n, k, λ, µ), where λ = µ and k = {v GF (2) n f (v) 0}

11 Weighted partial difference sets Let G be a finite abelian multiplicative group of order v and let D be a subset of G of cardinality k. Decompose D into a union of disjoint subsets D = D 1 D 2 D d and assume 1 / D. Let D i = k i.

12 Weighted partial difference sets D is a weighted partial difference set (PDS) if the following properties hold: The multiset D i D 1 j = {d 1 d 1 2 d 1 D i, d 2 D j } represents every non-identity element of D l exactly λ i,j,l times and every non-identity element of G \ D exactly µ i,j times (1 i, j, l d) For each i {1, 2,..., d}, j {1, 2,..., d} such that D 1 i = D j (if D 1 i = D i for all i, then the weighted PDS is symmetric)

13 Weighted Cayley Graphs Construction of a weighted Cayley graph X w (G, D) is similar to that of a standard Cayley graph Let G be a group, D a subset of G Decompose D into a union of subsets D 1 D 2 D d The vertices of the graph are the elements of G Two vertices g 1 and g 2 are connected by an edge of weight k if g 1 = dg 2 for some d D k

14 PDS Example G = GF (3)[x]/(x 2 + 1) = {0, 1, 2, x, x + 1, x + 2, 2x, 2x + 1, 2x + 2} (GF (9), +) D = {1, 2, x, 2x} {d 1 d 1 2 d 1, d 2 D} = {0, 2, 1 + 2x, 1 + x, 0, 1, 2x + 2, x + 2, 0, x + 2, x + 1, 2x, 0, 2x + 2, 2x + 1, x} So D is a (9,4,1,2) partial difference set.

15 Weighted PDS Example G = GF (3)[x]/(x 2 + 1) = {0, 1, 2, x, x + 1, x + 2, 2x, 2x + 1, 2x + 2} (additive group) D 1 = {1, 2}, D 2 = {x, 2x} {d 1 d 1 2 d 1, d 2 D 1 } = {0, 2, 0, 1} {d 1 d 1 2 d 1 D 1, d 2 D 2 } = {2x + 1, x + 1, x + 2, 2x + 2} {d 1 d 1 2 d 1, d 2 D 2 } = {0, 2x, 0, x} λ 1,1,1 = 1, λ 1,1,2 = 0, µ 1,1 = 0 λ 1,2,1 = 0, λ 1,2,2 = 0, µ 1,2 = 1 λ 2,2,1 = 0, λ 2,2,2 = 1, µ 2,2 = 0

16 Corresponding Cayley Graph

17 Using Level Curves as Weighted Partial Difference Sets Let f : GF (p) n GF (p) be a function. One possible way to generate a weighted partial difference set is as follows: G = GF (p) n D 0 = {0} D i = f 1 (i) for i = 1, 2,..., p 1 D p = f 1 (0) {0}

18 Association schemes S is a finite set R 0, R 1,..., R d binary relations on S R 0 = {(x, x) S S x S} R i = {(x, y) S S (y, x) R i } Then (S, R 0, R 1,..., R d ) is a d-class association scheme if: S S = R 0 R 1 R d, with R i R j = for all i j. For each i, j such that Ri = R j For all i, j and all (x, y) S S, define p ij (x, y) = {z S (x, z) R i, (z, y) R j }. For all k and for all (x, y) R k, p ij (x, y) is a constant, denoted p k ij.

19 Corresponding Weighted Partial Difference Sets to Association Schemes Let G be a group with a weighted partial difference set D = D 1 D 2 D d Construct an association scheme as follows: S = G R 0 = {(g, g) G G g G} R i = {(g, h) G G gh 1 D i, g h} (for i = 1, 2,..., d) R d+1 = {(g, h) G G gh 1 / D, g h}

20 Schur rings G a finite abelian group C 0, C 1,..., C d finite subsets of G identify each C i as a formal sum of its elements in C[G] The subalgebra of C[G] generated by C 0, C 1,..., C d is a Schur ring if: C 0 = {1}, the singleton containing the identity G = C 0 C 1 C d, with C i C j = for all i j for each i, j such that C 1 i for all i, j, for some integers p k ij C i C j = = C j d pij k C k, k=0

21 Schur ring example Let G = {ζ k k Z, 0 k 5}, where ζ = e 2πi/6 D 0 = {ζ 0 } = {1}, D 1 = {ζ 2, ζ 4 }, D 2 = {ζ, ζ 3, ζ 5 } By this same process, D 1 D 2 = (ζ 2 + ζ 4 ) (ζ + ζ 3 + ζ 5 ) = ζ 3 + ζ 5 + ζ 7 + ζ 5 + ζ 7 + ζ 9 = 2ζ + 2ζ 3 + 2ζ 5 = 2D 2 D 1 D 1 = 2D 0 + D 1 D 2 D 2 = 3D 0 + 3D 1 Therefore, the intersection numbers for this Schur ring are: p 0 11 = 2, p1 11 = 1, p2 11 = 0 p 0 12 = 0, p1 12 = 0, p2 12 = 2 p 0 22 = 3, p1 22 = 3, p2 22 = 0

22 Adjacency matrices S a finite set {s 1, s 2,, s m } R 0, R 1,, R d defined as above The adjacency matrix of R l is the m m matrix A l whose (i, j)th entry is 1 if (s i, s j ) R l or 0 otherwise We say that a subring A 1,..., A d of C[M m m (Z)] is an adjacency ring or Bose-Mesner algebra if: for each i {0,..., d}, A i is a (0, 1)-matrix, d i=0 A i = J (the all 1 s matrix), for each i {0,..., d}, t A i = A j, for some j {0,..., d}, there is a subset J {0,..., d} such that j J A j = I, and there is a set of non-negative integers {p k ij i, j, k {0,..., d}} such that for all such i, j. d A i A j = pij k A k, k=0

23 Constructing Adjacency Matrices Constructing an adjacency matrix A k from a weighted partial difference set Let G be a group of order v, D = D 1 D d a weighted PDS A k is a v v matrix (i, j)th entry = 1 if i j D k, 0 otherwise Constructing an adjacency matrix A k from a weighted Cayley graph X w (G, D): A k is a v v matrix, where v = G (i, j)th entry = 1 if vertices g i and g j are connected by an edge of weight k

24 Adjacency Matrices for GF (9) Example A 1 = A 2 =

25 Important Theorems

26 Intersection number-matrix theorem G a finite abelian group, D 0,, D d G such that D i D j = if i j, and G is the disjoint union of D 0 D d for each i there is a j such that D 1 = D j, and D i D j = l k=0 p k ij D k for some positive integer p k ij. Then the matrices P k = (p k ij ) 0 i,j d satisfy the following properties: P 0 is a diagonal matrix with entries D 0,, D d For each k, the jth column of P k has sum D j (j = 0,, d). Likewise, the ith row of P k has sum D i (i = 0,, d). i

27 Intersection number-trace theorem Let f : GF (p) n GF (p) be a function, Γ be its Cayley graph. Assume Γ is a weighted strongly regular graph. Let A = (a k,l ) be the adjacency matrix of Γ. Let A i = (ak,l i ) be the (0, 1)-matrix where { 1 if a k,l = i a i k,l = 0 otherwise for each i = 1, 2,..., p 1. Let A 0 = I. Let A p be the (0, 1)-matrix such that A 0 + A A p 1 + A p = J. The intersection numbers p k ij defined by satisfy the formula for all i, j, k = 1, 2,..., p. A i A j = p pij ka k k=0 ( ) 1 pij k = p n Tr(A i A j A k ) D k

28 Connections between intersection numbers Let G = GF (p) n. Let D 0,, D d G such that D i D j = if i j, and G is the disjoint union D 0 D d for each i there is a j such that D 1 D i D j = l k=0 i = D j, and p k ij D k for some positive integer p k ij. Then, for all i, j, k, D k p k ij = D i p i kj.

29 Main Results

30 First result: even bent functions f : GF (3) 2 GF (3) If f is an even, bent function such that f (0) = 0 and the level curves f 1 (i) yield a weighted PDS then one of the following occurs: We have D 1 = D 2 = 2, and the intersection numbers p k ij are given as follows: pij pij pij pij

31 We have D 1 = D 2 = 4, D 3 =, and the intersection numbers p k ij are given as follows: pij pij pij no p 3 ij Since D 3 =, there are no i, j such that D i D j will produce elements of D 3.

32 Chart of even bent functions GF (3) 2 (0, 0) (1, 0) (2, 0) (0, 1) (1, 1) (2, 1) (0, 2) (1, 2) (2, 2) b b b b b b b b b b b b b b b b b b

33 Second result: even bent functions f : GF (3) 3 GF (3) If f is an even, bent function such that f (0) = 0 and the level curves f 1 (i) yield a weighted PDS then one of the following occurs: We have D 1 = 6, D 2 = 12, and the intersection numbers p k ij are given as follows: pij pij pij pij

34 We have D 1 = 12, D 2 = 6, and the intersection numbers p k ij are given as follows: pij pij pij pij

35 Preserving structures under function composition Suppose: f : GF (p) n GF (p) is an even function such that f (0) = 0 D i = f 1 (i) for i GF (p) φ : GF (p) n GF (p) n is a linear map that is invertible (i.e., det φ 0 mod p) g = f φ If the collection of sets D 1, D 2,, D p 1 forms a weighted partial difference set for GF (p) n then so does its image under the function φ. Additionally, the Schur ring associated to the weighted partial difference set of f is isomorphic to the Schur ring associated to the weighted partial difference set of g.

36 Group action Let G be a multiplicative group and let X be a set. G acts on X (on the left) if there exists a map ρ : G X X such that: ρ(1 G, x) = x for all x X ρ(g, ρ(h, x)) = ρ(gh, x) for all g, h G, x X An orbit is any set of the form {ρ(g, x) g G}; we call this the orbit of x.

37 Proof of second result Consider the set E of all functions f : GF (3) 3 GF (3) such that f is even f (0) = 0 the degree of the algebraic normal form of f is at most 4 There are 3 12 = 531, 441 such functions Let B E be the subset of bent functions Let G = GL(3, GF (3)) be the set of linear automorphisms φ : GF (3) 3 GF (3) 3. f E is equivalent to g E if and only if f is sent to g under some element of G.

38 Proof (cont.) signature of f : sequence of cardinalities of the level curves f 1 (1) and f 1 (2). All of the functions in each equivalence class have the same signature. 35 unique signatures across all functions on GF (3) 3 Mathematica was used to find all equivalence classes of functions in E; 281 total equivalence classes, but only 4 classes consist of bent functions. Call these classes B 1, B 2, B 3, B 4 ; then B = B 1 B 2 B 3 B 4

39 Two equivalence classes had signature (6,12) and two classes had signature (12,6) x x x 2 3 represents B 1, a class of 234 functions of signature (6,12) x 1 x 3 + 2x x 2 1 x 2 2 represents B 2, a class of 936 functions of signature (6,12) B 3 = B 1, B 4 = B 2 We conclude through calculation that B 1 corresponds with the first condition of the theorem, while B 3 corresponds to the second condition. B 2 and B 4 do not yield weighted partial difference sets.

40 Conclusions/Further Research Main result is only a partial characterization Certain constraints on the functions Reverse claim? Characterization in GF (5) n Developing non-linear cryptanalysis

Explorations of edge-weighted Cayley graphs and p-ary bent functions

Explorations of edge-weighted Cayley graphs and p-ary bent functions arxiv:406.087v [math.co] 4 Jun 204 Explorations of edge-weighted Cayley graphs and p-ary bent functions Charles Celerier, David Joyner, Caroline Melles, David Phillips, Steven Walsh June 8, 208 Abstract

More information

Critical Groups for Cayley Graphs of Bent Functions

Critical Groups for Cayley Graphs of Bent Functions Critical Groups for Cayley Graphs of Bent Functions Thomas F. Gruebl Adviser: David Joyner December 9, 2015 1 Introduction This paper will study the critical group of bent functions in the p-ary case.

More information

Lecture 10-11: General attacks on LFSR based stream ciphers

Lecture 10-11: General attacks on LFSR based stream ciphers Lecture 10-11: General attacks on LFSR based stream ciphers Thomas Johansson T. Johansson (Lund University) 1 / 23 Introduction z = z 1, z 2,..., z N is a known keystream sequence find a distinguishing

More information

Constructions of partial geometric difference sets

Constructions of partial geometric difference sets Constructions of partial geometric difference sets Oktay Olmez Department of Mathematics Ankara University New Directions in Combinatorics May 24, 2016 Singapore Partial geometric designs Partial geometric

More information

Butson-Hadamard matrices in association schemes of class 6 on Galois rings of characteristic 4

Butson-Hadamard matrices in association schemes of class 6 on Galois rings of characteristic 4 Butson-Hadamard matrices in association schemes of class 6 on Galois rings of characteristic 4 Akihiro Munemasa Tohoku University (joint work with Takuya Ikuta) November 17, 2017 Combinatorics Seminar

More information

Butson-Hadamard matrices in association schemes of class 6 on Galois rings of characteristic 4

Butson-Hadamard matrices in association schemes of class 6 on Galois rings of characteristic 4 Butson-Hadamard matrices in association schemes of class 6 on Galois rings of characteristic 4 Akihiro Munemasa Tohoku University (joint work with Takuya Ikuta) November 17, 2017 Combinatorics Seminar

More information

Introduction to Association Schemes

Introduction to Association Schemes Introduction to Association Schemes Akihiro Munemasa Tohoku University June 5 6, 24 Algebraic Combinatorics Summer School, Sendai Assumed results (i) Vandermonde determinant: a a m =. a m a m m i

More information

4.3 General attacks on LFSR based stream ciphers

4.3 General attacks on LFSR based stream ciphers 67 4.3 General attacks on LFSR based stream ciphers Recalling our initial discussion on possible attack scenarios, we now assume that z = z 1,z 2,...,z N is a known keystream sequence from a generator

More information

RING ELEMENTS AS SUMS OF UNITS

RING ELEMENTS AS SUMS OF UNITS 1 RING ELEMENTS AS SUMS OF UNITS CHARLES LANSKI AND ATTILA MARÓTI Abstract. In an Artinian ring R every element of R can be expressed as the sum of two units if and only if R/J(R) does not contain a summand

More information

GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory.

GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory. GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory. Linear Algebra Standard matrix manipulation to compute the kernel, intersection of subspaces, column spaces,

More information

Block vs. Stream cipher

Block vs. Stream cipher Block vs. Stream cipher Idea of a block cipher: partition the text into relatively large (e.g. 128 bits) blocks and encode each block separately. The encoding of each block generally depends on at most

More information

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS M. N. ELLINGHAM AND JUSTIN Z. SCHROEDER In memory of Mike Albertson. Abstract. A distinguishing partition for an action of a group Γ on a set

More information

Section 3 Isomorphic Binary Structures

Section 3 Isomorphic Binary Structures Section 3 Isomorphic Binary Structures Instructor: Yifan Yang Fall 2006 Outline Isomorphic binary structure An illustrative example Definition Examples Structural properties Definition and examples Identity

More information

Complex Hadamard matrices and 3-class association schemes

Complex Hadamard matrices and 3-class association schemes Complex Hadamard matrices and 3-class association schemes Akihiro Munemasa 1 1 Graduate School of Information Sciences Tohoku University (joint work with Takuya Ikuta) June 26, 2013 The 30th Algebraic

More information

Math 210C. The representation ring

Math 210C. The representation ring Math 210C. The representation ring 1. Introduction Let G be a nontrivial connected compact Lie group that is semisimple and simply connected (e.g., SU(n) for n 2, Sp(n) for n 1, or Spin(n) for n 3). Let

More information

Optimizing the placement of tap positions. joint work with Enes Pasalic, Samed Bajrić and Yongzhuang Wei

Optimizing the placement of tap positions. joint work with Enes Pasalic, Samed Bajrić and Yongzhuang Wei Optimizing the placement of tap positions Samir Hodžić joint work with Enes Pasalic, Samed Bajrić and Yongzhuang Wei Filtering generator Linear feedback shift register (LFSR). Nonlinear filtering function

More information

MATH 433 Applied Algebra Lecture 22: Review for Exam 2.

MATH 433 Applied Algebra Lecture 22: Review for Exam 2. MATH 433 Applied Algebra Lecture 22: Review for Exam 2. Topics for Exam 2 Permutations Cycles, transpositions Cycle decomposition of a permutation Order of a permutation Sign of a permutation Symmetric

More information

3.8 MEASURE OF RUNDOMNESS:

3.8 MEASURE OF RUNDOMNESS: Lec 10 : Data Security Stream Cipher Systems 1 3.8 MEASURE OF RUNDOMNESS: 3.9.1 DEFINITION: Run: sequence of identical bits (0 or 1) Ex.01110000111 Runs are 0,111, 0000, 111 Gap: runs of zeroes 1000011

More information

MIT Algebraic techniques and semidefinite optimization May 9, Lecture 21. Lecturer: Pablo A. Parrilo Scribe:???

MIT Algebraic techniques and semidefinite optimization May 9, Lecture 21. Lecturer: Pablo A. Parrilo Scribe:??? MIT 6.972 Algebraic techniques and semidefinite optimization May 9, 2006 Lecture 2 Lecturer: Pablo A. Parrilo Scribe:??? In this lecture we study techniques to exploit the symmetry that can be present

More information

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER 177 CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER 178 12.1 Introduction The study of cryptography of gray level images [110, 112, 118] by using block ciphers has gained considerable

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Discrete Mathematics. Benny George K. September 22, 2011

Discrete Mathematics. Benny George K. September 22, 2011 Discrete Mathematics Benny George K Department of Computer Science and Engineering Indian Institute of Technology Guwahati ben@iitg.ernet.in September 22, 2011 Set Theory Elementary Concepts Let A and

More information

CSIR - Algebra Problems

CSIR - Algebra Problems CSIR - Algebra Problems N. Annamalai DST - INSPIRE Fellow (SRF) Department of Mathematics Bharathidasan University Tiruchirappalli -620024 E-mail: algebra.annamalai@gmail.com Website: https://annamalaimaths.wordpress.com

More information

Characterization of 2 n -Periodic Binary Sequences with Fixed 2-error or 3-error Linear Complexity

Characterization of 2 n -Periodic Binary Sequences with Fixed 2-error or 3-error Linear Complexity Characterization of n -Periodic Binary Sequences with Fixed -error or 3-error Linear Complexity Ramakanth Kavuluru Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA. Abstract

More information

Quasigroups and stream cipher Edon80

Quasigroups and stream cipher Edon80 Department of Algebra, Charles University in Prague June 3, 2010 Stream cipher Edon80 Edon80 is a binary additive stream cipher Input stream m i ( c i ) K Edon80 KEYSTREAM GENERATOR k i Output stream c

More information

A Questionable Distance-Regular Graph

A Questionable Distance-Regular Graph A Questionable Distance-Regular Graph Rebecca Ross Abstract In this paper, we introduce distance-regular graphs and develop the intersection algebra for these graphs which is based upon its intersection

More information

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.

More information

Fast correlation attacks on certain stream ciphers

Fast correlation attacks on certain stream ciphers FSE 2011, February 14-16, Lyngby, Denmark Fast correlation attacks on certain stream ciphers Willi Meier FHNW Switzerland 1 Overview A decoding problem LFSR-based stream ciphers Correlation attacks Fast

More information

L9: Galois Fields. Reading material

L9: Galois Fields. Reading material L9: Galois Fields Reading material Muzio & Wesselkamper Multiple-valued switching theory, p. 3-5, - 4 Sasao, Switching theory for logic synthesis, pp. 43-44 p. 2 - Advanced Logic Design L9 - Elena Dubrova

More information

On some incidence structures constructed from groups and related codes

On some incidence structures constructed from groups and related codes On some incidence structures constructed from groups and related codes Dean Crnković Department of Mathematics University of Rijeka Croatia Algebraic Combinatorics and Applications The first annual Kliakhandler

More information

Sequences, DFT and Resistance against Fast Algebraic Attacks

Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS

AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS MAX GOLDBERG Abstract. We explore ways to concisely describe circulant graphs, highly symmetric graphs with properties that are easier to generalize

More information

Group-theoretic approach to Fast Matrix Multiplication

Group-theoretic approach to Fast Matrix Multiplication Jenya Kirshtein 1 Group-theoretic approach to Fast Matrix Multiplication Jenya Kirshtein Department of Mathematics University of Denver Jenya Kirshtein 2 References 1. H. Cohn, C. Umans. Group-theoretic

More information

MATH 101: ALGEBRA I WORKSHEET, DAY #1. We review the prerequisites for the course in set theory and beginning a first pass on group. 1.

MATH 101: ALGEBRA I WORKSHEET, DAY #1. We review the prerequisites for the course in set theory and beginning a first pass on group. 1. MATH 101: ALGEBRA I WORKSHEET, DAY #1 We review the prerequisites for the course in set theory and beginning a first pass on group theory. Fill in the blanks as we go along. 1. Sets A set is a collection

More information

Math 3121, A Summary of Sections 0,1,2,4,5,6,7,8,9

Math 3121, A Summary of Sections 0,1,2,4,5,6,7,8,9 Math 3121, A Summary of Sections 0,1,2,4,5,6,7,8,9 Section 0. Sets and Relations Subset of a set, B A, B A (Definition 0.1). Cartesian product of sets A B ( Defintion 0.4). Relation (Defintion 0.7). Function,

More information

Pseudo-Random Number Generators

Pseudo-Random Number Generators Unit 41 April 18, 2011 1 Pseudo-Random Number Generators Recall the one-time pad: k = k 1, k 2, k 3... a random bit-string p = p 1, p 2, p 3,... plaintext bits E(p) = p k. We desire long sequences of numbers

More information

CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux

CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S Ant nine J aux (g) CRC Press Taylor 8* Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor &

More information

18.312: Algebraic Combinatorics Lionel Levine. Lecture 19

18.312: Algebraic Combinatorics Lionel Levine. Lecture 19 832: Algebraic Combinatorics Lionel Levine Lecture date: April 2, 20 Lecture 9 Notes by: David Witmer Matrix-Tree Theorem Undirected Graphs Let G = (V, E) be a connected, undirected graph with n vertices,

More information

3-Class Association Schemes and Hadamard Matrices of a Certain Block Form

3-Class Association Schemes and Hadamard Matrices of a Certain Block Form Europ J Combinatorics (1998) 19, 943 951 Article No ej980251 3-Class Association Schemes and Hadamard Matrices of a Certain Block Form R W GOLDBACH AND H L CLAASEN We describe 3-class association schemes

More information

Analysis of Modern Stream Ciphers

Analysis of Modern Stream Ciphers Analysis of Modern Stream Ciphers Josef Pieprzyk Centre for Advanced Computing Algorithms and Cryptography, Macquarie University, Australia CANS - Singapore - December 2007 estream Outline 1. estream Project

More information

Directed Strongly Regular Graphs. Leif K. Jørgensen Aalborg University Denmark

Directed Strongly Regular Graphs. Leif K. Jørgensen Aalborg University Denmark Directed Strongly Regular Graphs Leif K. Jørgensen Aalborg University Denmark A. Duval 1988: A directed strongly regular graph with parameters v, k, t, λ, µ is a directed graph with the following properties:

More information

ACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms Part a: You are given a graph G = (V,E) with edge weights w(e) > 0 for e E. You are also given a minimum cost spanning tree (MST) T. For one particular edge

More information

1 Introduction In [2] a method for computing the Walsh spectrum in R-encoding of a completely specified binary-valued function was presented based on

1 Introduction In [2] a method for computing the Walsh spectrum in R-encoding of a completely specified binary-valued function was presented based on Computation of Discrete Function Chrestenson Spectrum Using Cayley Color Graphs Λ Mitchell A. Thornton Southern Methodist University Dallas, Texas mitch@engr.smu.edu D. Michael Miller University of Victoria

More information

18.312: Algebraic Combinatorics Lionel Levine. Lecture 22. Smith normal form of an integer matrix (linear algebra over Z).

18.312: Algebraic Combinatorics Lionel Levine. Lecture 22. Smith normal form of an integer matrix (linear algebra over Z). 18.312: Algebraic Combinatorics Lionel Levine Lecture date: May 3, 2011 Lecture 22 Notes by: Lou Odette This lecture: Smith normal form of an integer matrix (linear algebra over Z). 1 Review of Abelian

More information

Very few Moore Graphs

Very few Moore Graphs Very few Moore Graphs Anurag Bishnoi June 7, 0 Abstract We prove here a well known result in graph theory, originally proved by Hoffman and Singleton, that any non-trivial Moore graph of diameter is regular

More information

Strongly Regular Decompositions of the Complete Graph

Strongly Regular Decompositions of the Complete Graph Journal of Algebraic Combinatorics, 17, 181 201, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Strongly Regular Decompositions of the Complete Graph EDWIN R. VAN DAM Edwin.vanDam@uvt.nl

More information

Thesis Research Notes

Thesis Research Notes Thesis Research Notes Week 26-2012 Christopher Wood June 29, 2012 Abstract This week was devoted to reviewing some classical literature on the subject of Boolean functions and their application to cryptography.

More information

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by

More information

Math 121 Homework 5: Notes on Selected Problems

Math 121 Homework 5: Notes on Selected Problems Math 121 Homework 5: Notes on Selected Problems 12.1.2. Let M be a module over the integral domain R. (a) Assume that M has rank n and that x 1,..., x n is any maximal set of linearly independent elements

More information

Recommended questions: a-d 4f 5 9a a 27.

Recommended questions: a-d 4f 5 9a a 27. Sheet jacques@ucsdedu Recommended questions: 2 3 4a-d 4f 5 9a 0 2 3 5 6 8 9 20 22 23 24 25a 27 Recommended reading for this assignment: Aigner Chapter, Chapter 2-24 Formal power series Question Let R be

More information

The Matrix-Tree Theorem

The Matrix-Tree Theorem The Matrix-Tree Theorem Christopher Eur March 22, 2015 Abstract: We give a brief introduction to graph theory in light of linear algebra. Our results culminates in the proof of Matrix-Tree Theorem. 1 Preliminaries

More information

Elementary maths for GMT

Elementary maths for GMT Elementary maths for GMT Linear Algebra Part 2: Matrices, Elimination and Determinant m n matrices The system of m linear equations in n variables x 1, x 2,, x n a 11 x 1 + a 12 x 2 + + a 1n x n = b 1

More information

Characterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs. Sung Y. Song Iowa State University

Characterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs. Sung Y. Song Iowa State University Characterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs Sung Y. Song Iowa State University sysong@iastate.edu Notation K: one of the fields R or C X: a nonempty finite set

More information

TC08 / 6. Hadamard codes SX

TC08 / 6. Hadamard codes SX TC8 / 6. Hadamard codes 3.2.7 SX Hadamard matrices Hadamard matrices. Paley s construction of Hadamard matrices Hadamard codes. Decoding Hadamard codes A Hadamard matrix of order is a matrix of type whose

More information

Representations. 1 Basic definitions

Representations. 1 Basic definitions Representations 1 Basic definitions If V is a k-vector space, we denote by Aut V the group of k-linear isomorphisms F : V V and by End V the k-vector space of k-linear maps F : V V. Thus, if V = k n, then

More information

Supplement. Dr. Bob s Modern Algebra Glossary Based on Fraleigh s A First Course on Abstract Algebra, 7th Edition, Sections 0 through IV.

Supplement. Dr. Bob s Modern Algebra Glossary Based on Fraleigh s A First Course on Abstract Algebra, 7th Edition, Sections 0 through IV. Glossary 1 Supplement. Dr. Bob s Modern Algebra Glossary Based on Fraleigh s A First Course on Abstract Algebra, 7th Edition, Sections 0 through IV.23 Abelian Group. A group G, (or just G for short) is

More information

Cryptanalysis of Achterbahn

Cryptanalysis of Achterbahn Cryptanalysis of Achterbahn Thomas Johansson 1, Willi Meier 2, and Frédéric Muller 3 1 Department of Information Technology, Lund University P.O. Box 118, 221 00 Lund, Sweden thomas@it.lth.se 2 FH Aargau,

More information

Twin bent functions and Clifford algebras

Twin bent functions and Clifford algebras Twin bent functions and Clifford algebras Paul Leopardi Mathematical Sciences Institute, Australian National University. For presentation at ADTHM 2014, Lethbridge. 8 July 2014 Acknowledgements Richard

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

Chapter 9: Relations Relations

Chapter 9: Relations Relations Chapter 9: Relations 9.1 - Relations Definition 1 (Relation). Let A and B be sets. A binary relation from A to B is a subset R A B, i.e., R is a set of ordered pairs where the first element from each pair

More information

Introduction to Groups

Introduction to Groups Introduction to Groups S F Ellermeyer November 2, 2006 A group, G, is a set, A, endowed with a single binary operation,, such that: The operation is associative, meaning that a (b c) = (a b) c for all

More information

Spectra of Semidirect Products of Cyclic Groups

Spectra of Semidirect Products of Cyclic Groups Spectra of Semidirect Products of Cyclic Groups Nathan Fox 1 University of Minnesota-Twin Cities Abstract The spectrum of a graph is the set of eigenvalues of its adjacency matrix A group, together with

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CSG 252 Fall 2006 Riccardo Pucella Goals of Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to communications Alice and Bob share a key K Alice

More information

ECEN 5682 Theory and Practice of Error Control Codes

ECEN 5682 Theory and Practice of Error Control Codes ECEN 5682 Theory and Practice of Error Control Codes Introduction to Algebra University of Colorado Spring 2007 Motivation and For convolutional codes it was convenient to express the datawords and the

More information

USING GRAPHS AND GAMES TO GENERATE CAP SET BOUNDS

USING GRAPHS AND GAMES TO GENERATE CAP SET BOUNDS USING GRAPHS AND GAMES TO GENERATE CAP SET BOUNDS JOSH ABBOTT AND TREVOR MCGUIRE Abstract. Let F 3 be the field with 3 elements and consider the k- dimensional affine space, F k 3, over F 3. A line of

More information

Exercises on chapter 1

Exercises on chapter 1 Exercises on chapter 1 1. Let G be a group and H and K be subgroups. Let HK = {hk h H, k K}. (i) Prove that HK is a subgroup of G if and only if HK = KH. (ii) If either H or K is a normal subgroup of G

More information

CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent

CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selçuk Kavut and Subhamoy Maitra 1 Abstract Nonlinearity is one of the most challenging combinatorial

More information

AES side channel attacks protection using random isomorphisms

AES side channel attacks protection using random isomorphisms Rostovtsev A.G., Shemyakina O.V., St. Petersburg State Polytechnic University AES side channel attacks protection using random isomorphisms General method of side-channel attacks protection, based on random

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Constructing a Ternary FCSR with a Given Connection Integer

Constructing a Ternary FCSR with a Given Connection Integer Constructing a Ternary FCSR with a Given Connection Integer Lin Zhiqiang 1,2 and Pei Dingyi 1,2 1 School of Mathematics and Information Sciences, Guangzhou University, China 2 State Key Laboratory of Information

More information

Designs over the binary field from the complete monomial group

Designs over the binary field from the complete monomial group AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 67(3) (2017), Pages 470 475 Designs over the binary field from the complete monomial group Michael Braun Faculty of Computer Science University of Applied Sciences

More information

Cryptography and Shift Registers

Cryptography and Shift Registers 6 The Open Mathematics Journal, 29, 2, 6-2 Cryptography and Shift Registers Open Access A.A. Bruen and R.A. Mollin,* Department of Electrical and Computer Engineering, University of Calgary, Canada Department

More information

1.10 Matrix Representation of Graphs

1.10 Matrix Representation of Graphs 42 Basic Concepts of Graphs 1.10 Matrix Representation of Graphs Definitions: In this section, we introduce two kinds of matrix representations of a graph, that is, the adjacency matrix and incidence matrix

More information

UNPREDICTABLE BINARY STRINGS

UNPREDICTABLE BINARY STRINGS UNPREDICTABLE BINARY STRINGS R.M. LOW, M. STAMP, R. CRAIGEN, AND G. FAUCHER Abstract. We examine a class of binary strings arising from considerations about stream cipher encryption: to what degree can

More information

MATH 8253 ALGEBRAIC GEOMETRY WEEK 12

MATH 8253 ALGEBRAIC GEOMETRY WEEK 12 MATH 8253 ALGEBRAIC GEOMETRY WEEK 2 CİHAN BAHRAN 3.2.. Let Y be a Noetherian scheme. Show that any Y -scheme X of finite type is Noetherian. Moreover, if Y is of finite dimension, then so is X. Write f

More information

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Primitive and normal polynomials over a finite field are, of course, particular examples of irreducible polynomials over

More information

Square 2-designs/1. 1 Definition

Square 2-designs/1. 1 Definition Square 2-designs Square 2-designs are variously known as symmetric designs, symmetric BIBDs, and projective designs. The definition does not imply any symmetry of the design, and the term projective designs,

More information

Linear algebra and applications to graphs Part 1

Linear algebra and applications to graphs Part 1 Linear algebra and applications to graphs Part 1 Written up by Mikhail Belkin and Moon Duchin Instructor: Laszlo Babai June 17, 2001 1 Basic Linear Algebra Exercise 1.1 Let V and W be linear subspaces

More information

Monoids. Definition: A binary operation on a set M is a function : M M M. Examples:

Monoids. Definition: A binary operation on a set M is a function : M M M. Examples: Monoids Definition: A binary operation on a set M is a function : M M M. If : M M M, we say that is well defined on M or equivalently, that M is closed under the operation. Examples: Definition: A monoid

More information

Functions on Finite Fields, Boolean Functions, and S-Boxes

Functions on Finite Fields, Boolean Functions, and S-Boxes Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function

More information

STREAM CIPHER. Chapter - 3

STREAM CIPHER. Chapter - 3 STREAM CIPHER Chapter - 3 S t r e a m C i p h e r P a g e 38 S t r e a m C i p h e r P a g e 39 STREAM CIPHERS Stream cipher is a class of symmetric key algorithm that operates on individual bits or bytes.

More information

Unpredictable Binary Strings

Unpredictable Binary Strings San Jose State University From the SelectedWorks of Mark Stamp 2005 Unpredictable Binary Strings Richard M. Low, San Jose State University Mark Stamp, San Jose State University R. Craigen, University of

More information

Constructions for Hadamard matrices using Clifford algebras, and their relation to amicability / anti-amicability graphs

Constructions for Hadamard matrices using Clifford algebras, and their relation to amicability / anti-amicability graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 58(2) (2014), Pages 214 248 Constructions for Hadamard matrices using Clifford algebras, and their relation to amicability / anti-amicability graphs Paul C.

More information

ICALP g Mingji Xia

ICALP g Mingji Xia : : ICALP 2010 g Institute of Software Chinese Academy of Sciences 2010.7.6 : 1 2 3 Matrix multiplication : Product of vectors and matrices. AC = e [n] a ec e A = (a e), C = (c e). ABC = e,e [n] a eb ee

More information

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers presented by Goutam Sen Research Scholar IITB Monash Research Academy. 1 Agenda: Introduction to Stream Ciphers

More information

Notes on Freiman s Theorem

Notes on Freiman s Theorem Notes on Freiman s Theorem Jacques Verstraëte Department of Mathematics University of California, San Diego La Jolla, CA, 92093. E-mail: jacques@ucsd.edu. 1 Introduction Freiman s Theorem describes the

More information

LARGE SCHRÖDER PATHS BY TYPES AND SYMMETRIC FUNCTIONS

LARGE SCHRÖDER PATHS BY TYPES AND SYMMETRIC FUNCTIONS Bull. Korean Math. Soc. 51 (2014), No. 4, pp. 1229 1240 http://dx.doi.org/10.4134/bkms.2014.51.4.1229 LARGE SCHRÖDER PATHS BY TYPES AND SYMMETRIC FUNCTIONS Su Hyung An, Sen-Peng Eu, and Sangwook Kim Abstract.

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

On The Nonlinearity of Maximum-length NFSR Feedbacks

On The Nonlinearity of Maximum-length NFSR Feedbacks On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main

More information

The rank of connection matrices and the dimension of graph algebras

The rank of connection matrices and the dimension of graph algebras The rank of connection matrices and the dimension of graph algebras László Lovász Microsoft Research One Microsoft Way Redmond, WA 98052 August 2004 Microsoft Research Technical Report TR-2004-82 Contents

More information

Representation Theory. Ricky Roy Math 434 University of Puget Sound

Representation Theory. Ricky Roy Math 434 University of Puget Sound Representation Theory Ricky Roy Math 434 University of Puget Sound May 2, 2010 Introduction In our study of group theory, we set out to classify all distinct groups of a given order up to isomorphism.

More information

Permutation-like matrix groups

Permutation-like matrix groups Linear Algebra and its Applications 422 (2007) 486 505 www.elsevier.com/locate/laa Permutation-like matrix groups Grega Cigler University of Ljubljana, Faculty for Mathematics and Physics, Jadranska 9,

More information

Algebra Ph.D. Preliminary Exam

Algebra Ph.D. Preliminary Exam RETURN THIS COVER SHEET WITH YOUR EXAM AND SOLUTIONS! Algebra Ph.D. Preliminary Exam August 18, 2008 INSTRUCTIONS: 1. Answer each question on a separate page. Turn in a page for each problem even if you

More information

Character tables for some small groups

Character tables for some small groups Character tables for some small groups P R Hewitt U of Toledo 12 Feb 07 References: 1. P Neumann, On a lemma which is not Burnside s, Mathematical Scientist 4 (1979), 133-141. 2. JH Conway et al., Atlas

More information

ALGEBRA QUALIFYING EXAM SPRING 2012

ALGEBRA QUALIFYING EXAM SPRING 2012 ALGEBRA QUALIFYING EXAM SPRING 2012 Work all of the problems. Justify the statements in your solutions by reference to specific results, as appropriate. Partial credit is awarded for partial solutions.

More information

Parity Versions of 2-Connectedness

Parity Versions of 2-Connectedness Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida

More information

Scaffolds. A graph-based system for computations in Bose-Mesner algebras. William J. Martin

Scaffolds. A graph-based system for computations in Bose-Mesner algebras. William J. Martin A graph-based system for computations in Bose-esner algebras Department of athematical Sciences and Department of Computer Science Worcester Polytechnic Institute Algebraic Combinatorics Seminar Shanghai

More information

REPRESENTATION THEORY OF S n

REPRESENTATION THEORY OF S n REPRESENTATION THEORY OF S n EVAN JENKINS Abstract. These are notes from three lectures given in MATH 26700, Introduction to Representation Theory of Finite Groups, at the University of Chicago in November

More information

Topic 3. Design of Sequences with Low Correlation

Topic 3. Design of Sequences with Low Correlation Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4

More information

Laplacians of Graphs, Spectra and Laplacian polynomials

Laplacians of Graphs, Spectra and Laplacian polynomials Laplacians of Graphs, Spectra and Laplacian polynomials Lector: Alexander Mednykh Sobolev Institute of Mathematics Novosibirsk State University Winter School in Harmonic Functions on Graphs and Combinatorial

More information